|
Question 1. The JDAPI program that you are running throws JdapillegalStateException. What is a possible cause for this exception? A. The remove() method of JDAPI iterators has failed. B. The compile() method of the PlsqlLibrary class has failed. C. The underlying Forms code is failing to create Forms objects. D. The program may be calling a method on a Forms object that has been destroyed. Answer: D Question 2. Your manager asks you to maintain a log of the IP addresses of all sessions that run your company’s Forms applications. To accomplish this, you decide to implement session-level Servlet Logging for all users. How do you perform this task? A. Add the SERVERURL parameter to the FORMS90.CONF file. B. Modify the SERVERURL parameter in the Forms Servlet configuration file. C. Define the SERVERURL environment variable in the Forms environment file. D. Modify the SERVERURL parameter in the WEB.XML file for the Forms Servlet. E. You do not need to do anything; session-level Servlet Logging is performed by default. Answer: B Question 3. You have set the environment variables FORMS90_DATETIME_LOCAL_TZ and FORMS90_TZ_FILE to implement time-zone support, but you have not defined a value for the FORMS90_DATETIME_SERVER_TZ How do you expect Oracle9i Forms to behave at run time? A. A run-error will occur. B. FORMS90_DATETIME_SERVER_TZ will be se to GMT. C. FORMS90_DATETIME_SERVER_TZ will be set to the database server time-zone region. D. FORMS90_DATETIME_SERVER_TZ will be set to the value of FORMS90_DATETIME_LOCAL_TC. Answer: B Question 4. What do the CFAPI and JDAPI utilities develop? A. Forms modules only. B. Forms modules and object libraries only. C. Forms modules and menu modules only. D. Forms modules, menu modules, object libraries. E. Forms modules, menu modules, object libraries, and PL/SQL libraries. Answer: E Question 5. Which statement about the Java Design-Time API (JDAPI) is true? A. It is built on top of the C Forms API. B. It replaces the C Forms API (CFAPI) that was available in Forms 6i. C. It enables invocation of the C Forms API from a Java program. D. It is unrelated to the C Forms API because its functionality is completely different. Answer: A Question 6. Which statement best describes what JavaBeans enable you to do? A. Change the function and appearance of Forms items such as check boxes and radio buttons. B. Integrate Java code from the middle tier and from external Web services. C. Enable Forms to make use of Java code in the database by calling a Java stored procedure. D. Extend and customize the functionality of a form by embedding a Java component. Answer: D Question 7. Exhibit: ***MISSING*** You migrated an application from Forms 4.5 to Oracle9iForms. One of the forms in the application is a registration form for new users of your company’s Web site. The exhibit depicts the Layout Editor for this registration form, along with the PL/SQL Editor that shows the When-Validate-Item trigger on the required user_id item. In this form, the form-level Defer Required Enforcement property is set to Yes to enable users to tab out of the user_id item without entering a value. When this happens, a user ID should be automatically generated. When you test the upgraded registration form, you notice that the When-Validate-Item trigger does not fire when users leave the user_id item blank, so the automatic generation of user ID does not function. The form worked perfectly in Forms 4.5. What can you do to resolve the desired functionality without recording? A. Set the form-level Runtime Compatibility Mode property to 4.5 so that the When-Validate-Item trigger fires for null items. B. Set the form-level Defer Required Enforcement property to 4.5 so that the When-Validate-Item trigger fires for null items. C. This is not possible, you must recode the application. D. Set the Runtime Compatibility Mode property on the user_id item to 4.5 so that the When- Validate-Item trigger fires even when user_id is null. E. Set the Execution Hierarchy property to After for the When-Validate-Item trigger on the user_id item so that it fires after the user tabs out of the item. Answer: B Question 8. When deploying JavaBeans, when must you digitally sign the JAR file? A. When the application does not use Jlnitiator. B. When the JAR file is not included in the ARCHIVE parameter. C. When all the actions performed by the JavaBeans are permitted by a Java applet. D. When all the actions performed by the JavaBeans are not permitted by a Java applet. Answer: D Question 9. Identify three actions that you could perform in previous version of Forms but that you are unable to perform in Oracle9iForms. (Choose three) A. Create a sound item. B. Create menu parameters. C. Create a bean area item. D. Use middle-tier Java code. E. Change the font characteristics of an item. F. Start the run-time process from the command line. Answer: A, B, F Question 10. Exhibit: ***MISSING*** Which statement is true about the accompanying exhibit? A. If you click Step Over, the highlighted subprogram is removed from the Stack panel. B. If you click the second line in the Stack panel, the Variables panel changes the show the variables that are defined in the RAISE_SALARIES subprogram. C. If you click the second line in the Stack panel and then click Step Into, the debugger steps to the next line of code in the RAISE_SALARIES subprogram. D. If you click Go, the CHECK_PERCENT subprogram finishes executing and the debugger steps to the next line of code in the RAISE_SALARIES subprogram. Answer: Pending, send your suggestions or feedback at feedback@itcertkeys.com. Question 11. You are using a hyperlink JavaBean in a form so that users can click the bean area at run time to open your company’s Web page. What must you do to make the hyperlink bean functional? A. Register the JavaBean and set its properties. B. Set the JaveBean’s properties and enable its listener. C. Register the JavaBean, at either design time or run time. D. Register the JavaBean, set it properties, and enable the listener for the event. Answer: D Question 12. Exhibit: ***MISSING*** You are upgrading a form that was written in Forms 6i. You open the form in the Oracle9iForms Builder. The data block of this form is shown in the exhibit as it appears in the object navigator of Forms Builder. What must you do to this form before it can compile successfully? A. Delete the image item. B. Delete the sound item. C. Convert the check boxes to radio groups. D. Recode the population of the image item so that it does not attempt to load images from the operating system. E. Use the FBean package to recode the functionality of the bean area item. Answer: B Question 13. Exhibit: ***MISSING*** You are upgrading an application that was developed using Forms6i. The application was previously deployed using only character mode. When you test the upgraded application, some of the data in the items appears to be cut off (as shown in the exhibit). When running with Forms6i character mode, the data was displayed completely. Users of the application require that all data be visible without placing the cursor in an item and scrolling to the end of the item. What is the easiest workaround for this situation? A. Use the WIDEN_FIELDS=YES option when upgrading the application. B. Set the MAPFONTS applet parameter to Yes when running the application. C. Set the RUNTIME_COMPATIBILITY_MODE form module property to a value of 6.0. D. Use Oracle Terminal to redefine the display characteristics in the resource file. E. Manually increase the item width for all items that do not completely display the data. F. Set the FORMS90_OUTPUT environment variable to a value of 6.0 when running the application. Answer: A Question 14. You are running a multiple-form application. The Customer form invokes the Orders form. When the Orders form launches, it displays orders for only the active customer from the Customer form. Forms exchange data with the :GLOBAL.CUSTOMER_ID variable. The Orders form should query orders for a customer only once after being launched from the Customers form. Which built-in helps you do this by setting the ONETIME_WHERE property to refer dynamically to the GLOBAL.CUSTOMER_ID? A. SET_APPLICATION_PROPERTY B. SET_FORM_PROPERTY C. SET_BLOCK_PROPERTY D. SET_RECORD_PROPERTY Answer: C Reference: ORACLE Developer Forms Techniques 2000 from Bulusu Lakshman 2000 Page: 43 Question 15. You are using Pluggable Java Components to modify the appearance and behavior of certain input items. These modifications cannot be done in the Property Palette of these items. Which built-in can you use to accomplish this task? A. SET_ITEM_INSTANCE_PROPERTY B. FBEAN.SET_PROPERTY C. SET_ITEM_PROPERTY D. SET_CUSTOM_PROPERTY Answer: D Question 16. For upgrading an application, what are four advantages of using Oracle9i Forms Migration Assistant compared with using Forms Builder? (Choose four) A. Converts all obsolete built-ins. B. Provides a log file of its messages. C. Enables you to upgrade a module in batch mode. D. Replaces obsolete items with supported item types. E. Increases the likelihood of successful compilation. F. Enables you to upgrade multiple modules with one command. G. Enables you to upgrade directly from any previous version of Forms. Answer: A, B, C, F Question 17. Your company uses a Forms 4.5 application. What is the most efficient way to migrate the application to Oracle9i Forms in a supported fashion? A. Upgrade directly to Oracle9i Forms. B. Upgrade to Forms 6i, then to Oracle9i Forms. C. Upgrade to Forms 5.0, the to Oracle9i Forms. D. Upgrade to Forms 5.0, then to Forms 6i, then to Oracle9i Forms. Answer: B Question 18. Which two methods can be used to deploy JavaBean for Forms application running an application server? (Choose two) A. Put all the required class files in the application server’s CODEBASE directory. B. Create Java stored procedures in the database for all the required Java classes. C. Put all the required class files in any of the application server’s directories that are referenced in the server’s FORMS90 PATH. D. Put all the required class files in a JAR file in the CODEBASE directory. Include the name of the JAR file in the ARCHIVE parameter. E. Load the JAR file containing the classes on each client because they cannot be downloaded from the application server. Answer: A, D Question 19. Exhibit: ***MISSING*** You are upgrading an application that was developed in Forms 6i. When you test the upgraded application, you notice that the boilerplate text labels overlap the text items (as shown in the exhibit). The labels appeared correctly when the application was Web deployed with the Forms 6i Listener. What is a possible workaround for this problem? A. Set the applet parameter MAPFONTS toYes when running the application. B. Use the WIDEN_FIELDS=YES option when upgrading the application. C. Set the environment variable FORMS90_MAPPING to the location of the Forms 6i fonts when running the application. D. Set the environment variable FORMS90_MAPPING to the location of the Forms 6i fonts when upgrading the application. E. There is not easy workaround. You must modify all the forms where boilerplate text overlaps the text items. Answer: A Question 20. Your task is to write a generic JDAPI program to process a block, an item, or a canvas object. What should you do? A. Use the Jdapilterator interface. B. Use the object-specified constructors. C. Use the JdapiObject interface and JdapiModule abstract type. D. Use the clone() method to treat different objects similarly. Answer: C
|
Question 1. You need to publish SecurePlatform routes using the ospf routing protocol. What is the correct command structure, once entering the route command, to implement ospf successfully? A. Run cpconfig utility to enable ospf routing B. ip route ospf ospf network1 ospf network2 C. Enable Configure terminal Router ospf [id] Network [network] [wildmask] area [id] D. Use DBedit utility to either the objects_5_0.c file Answer: C Explanation: Question 2. Control connections between the Security Management Server and the Gateway are not encrypted by the VPN Community. How are these connections secured? A. They are encrypted and authenticated using SIC. B. They are not encrypted, but are authenticated by the Gateway C. They are secured by PPTP D. They are not secured. Answer: D Explanation: Question 3. How does a cluster member take over the VIP after a failover event? A. Ping the sync interface B. if list -renew C. Broadcast storm D. Gratuitous ARP Answer: D Explanation: Question 4. You want to verify that your Check Point cluster is working correctly. Which command line tool can you use? A. cphaconf state B. cphaprob state C. cphainfo-s D. cphastart -status Answer: B Explanation: Question 5. ________is a proprietary Check Point protocol. it is the basis for Check Point ClusterXL intermodule communication. A. RDP B. CCP C. CKPP D. HA OPCODE Answer: B Explanation: Question 6. John is configuring a new R71 Gateway cluster but he can not configure the cluster as Third Party IP Clustering because this option is not available in Gateway Cluster Properties: What's happening? A. John is not using third party hardware as IP Clustering is part of Check Point's IP Appliance B .Third Party Clustering is not available for R71 Security Gateways. B. ClusterXL needs to be unselected to permit 3rd party clustering configuration. C. John has an invalid ClusterXL license. Answer: C Explanation: Question 7. You are MegaCorp Security Administrator. This company uses a firewall cluster, consisting of two cluster members. The cluster generally works well but one day you find that the cluster is behaving strangely. You assume that there is a connectivity problem with the cluster synchronization cluster link (cross-over cable). Which of the following commands is the best for testing the connectivity of the crossover cable? A. telnetB. arping C. ifconfig –a D. Ping Answer: B Explanation: Question 8. Organizations are sometimes faced with the need to locate cluster members in different geographic locations that are distant from each other. A typical example is replicated data centers whose location is widely separated for disaster recovery purposes. What are the restrictions of this solution? A. There are no restrictions. B. There is one restriction: The synchronization network must guarantee no more than 150 ms latency (ITU Standard G.114). C. There is one restriction: The synchronization network must guarantee no more than 100 ms latency. D. There are two restrictions: 1. The synchronization network must guarantee no more than 100ms latency and no more than 5% packet loss. 2. The synchronization network may only include switches and hubs. Answer: D Explanation: Question 9. You are establishing a ClusterXL environment, with the following topology: External interfaces 192.168.10.1 and 192.168.10.2 connect to a VLAN switch. The upstream router connects to the same VLAN switch. Internal interfaces 172.16 10.1 and 172.16.10.2 connect to a hub. 10.10.10.0 is the synchronization network. The Security Management Server is located on the internal network with IP 172.16.10.3. What is the problem with this configuration? A. There is an IP address conflict B. The Security Management Server must be in the dedicated synchronization network, not the internal network. C. The Cluster interface names must be identical across all cluster members. D. Cluster members cannot use the VLAN switch. They must use hubs. Answer: B Explanation: Question 10. Refer to Exhibit: Match the ClusterXL Modes with their configurations A. A-3, B-2, C-1, D-4 B. A-3, B-2, C-4, D-1 C. A-2, B-3, C-4, D-1 D. A-2, B-3, C-1, D-4 Answer: C Explanation:
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.