Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us

 Home

 Search

Latest Brain Dumps

 BrainDump List

 Certifications Dumps

 Microsoft

 CompTIA

 Oracle

  Cisco
  CIW
  Novell
  Linux
  Sun
  Certs Notes
  How-Tos & Practices 
  Free Online Demos
  Free Online Quizzes
  Free Study Guides
  Free Online Sims
  Material Submission
  Test Vouchers
  Users Submissions
  Site Links
  Submit Site

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Online Training Demos and Learning Tutorials for Windows XP, 2000, 2003.

 

 

 

 





Braindumps for "000-041" Exam

Programming with IBM Enterprise PL/I

 Question 1.
What is the result, if any, of executing the following code?
DCL A BIT(1) INIT('0'B);
DCL B BIT(1) INIT('0'B);
DCL C BIT(1) lNlT('1'B);
A = B ! C;

A. The value of A is '0'B
B. The value of A is'1'B.
C. The value of A is unpredictable.
D. There is no result, because the syntax is wrong.

Answer: B

Question 2.
What does BX.WOK.LOAD refer to in the following job control statement? I/ACCOUNT DD DSN=BX.WOK.LOAD,DISP=SHR

A. It is the connection between program and dataset.
B. It is the physical dataset name.
C. It is the logical dataset name.
D. It is the name which must be referred to in the program.

Answer: B

Question 3.
What will be printed when the following subroutine is called for the third time?
A: PROC;
DCLX PlC '9' INIT(O);
X = X+ 1;
PUT SKIP LIST ('THE VALUE OF X IS :'!!X);
X = X+ 1;
END A;

A. THE VALUE OF X IS : 1
B. THE VALUE OF X IS : 2
C. THE VALUE OF X IS : 3
D. THE VALUE OF X IS : 5

Answer: A

Question 4.
Given the following code, with what attribute should the variable EOF be declared? DO WHILE(^EOF);

A. FIXED BIN (7)
B. BIT (1)
C. CHAR (1)
D. FIXED DEC (3)

Answer: B

Question 5.
Which is the most appropriate code to turn all of the bits in A ON? DCL A BIT(8);

A. A = 255;
B. A = '11111111'B;
C. A = 11111111B;
D. A = -1;

Answer: B

Question 6.
What changes should be made, if any, to the following code?

DCL A CHAR(100) BASED(P);
DCL P PTR;
READ FILE(DDIN) INTO(A);

A. READ FILE(DDIN) SET(A);
B. READ FILE(DDIN) INTO(P);
C. READ FILE(DDIN) SET(P);
D. No changes necessary because the code is correct.

Answer: C

Question 7..
What is the value of B after executing the following code?

DCL A CHAR(10) VAR;
DCL B BIN FIXED(31) INIT(0);
DCL C CHAR(5) INIT('ABCD');
A = C;
B = LENGTH(A);

A. 10
B. 7
C. 5
D. 4

Answer: C

Question 8.
Which of the following is a BIN FIXED constant?

A. '1000'
B. 1E+03
C. 1000
D. 1000B

Answer: D

Question 9.
Which of the following is NOT a valid method to activate a BEGIN block?

A. A condition is signaled and the BEGIN block is a component of the corresponding ON unit.
B. Sequential program flow approaches the BEGIN block.
C. The BEGIN block is labeled and a GOTO addresses this label.
D. The BEGIN block is labeled and a CALL addresses this label.

Answer: D

Question 10.
Which is the most appropriate data type declaration for the variable A in the following expression, if A is used as a counter?

A = A + 1;

A. CHAR
B. BIN FIXED
C. FLOAT
D. PlC

Answer: B


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for HP0-081 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "HP0-081" Exam

OpenVMS Security Administration

 Question 1.
Why could OpenVMS Mail be considered a security risk?

A. OpenVMS Mail allows unprivileged unauthenticated (but potentially traceable) remote users to 
    test for valid usernames.
B. OpenVMS Mail allows unprivileged unauthenticated remote users to see who is actively logged 
    on.
C. DCL command procedures embedded in a mail message will be automatically executed during 
    user login unless the system manager defines the system logical name MAIL$DCL_DISABLE 
    to TRUE.
D. Buffer overflows caused by out of specification message attachments may allow arbitrary code 
    to be executed without prompting the recipient.

Answer: A

Question 2.
Which two object classes can have audit events applied to them? Select two.

A. logical name tables
B. logical names
C. global sections
D. event flags
E. locks

Answer: A, C

Question 3.
On a system with user file activity across several volumes, which command or utility can a system manager use to determine what files a process currently has open across all disk volumes?

A. SHOW DEVICE/FILES/NOSYSTEM *
B. ANALYZE /PROCESS
C. MONITOR FILE_SYSTEM_CACHE/ALL
D. ANALYZE /SYSTEM

Answer: D

Question 4.
What two items should be included in an organization's Configuration Management records? Select two.

A. software assets
B. staff contact details
C. details of support contracts
D. physical assets
E. organizational chart

Answer: A, D

Question 5.
Which two are the correct descriptions for L and P when discussing a device protection mask (RWLP)? Select two.

A. P = protected (allows access to protected devices)
B. L = logical (allows access to logical blocks)
C. P =passall (allows unlimited access to specified devices)
D. P = physical (allows access to physical blocks)
E. L = local (allows access from the local system only)
F. L = limited (allows limited access to specified devices)

Answer: B, D

Question 6.
DRAG DROP
Click the Task button.
You need to break into a system when none of the accounts or passwords are known. Using drag and drop, place the steps in the correct sequence to accomplish this.
 

Answer:
 

Question 7.
By default, what happens to system activity if the audit server's log destination runs out of disk space?

A. all batch jobs are suspended
B. normal operation continues, oldest audits are discarded
C. system crashes to protect integrity of auditing records
D. audit-generating user processes are suspended

Answer: D

Question 8.
The DCL command DIR 0:: fails with the error message %SYSTEM-F-LINKEXIT, network partner exited. Why could this happen?

A. no proxy
B. attempts to create a NETSERVER.LOG with a version number over 32767
C. proxy into non-existent target account
D. protection violation on login command procedures

Answer: D

Question 9.
A backup system disk copy is missing. What are two of the vulnerabilities that are introduced? Select two.

A. passwords can be directly extracted from VMS$PASSWORD_HISTORY.DATA
B. licenses can be extracted from LMF$LURT.DAT
C. protected system files and data can be read
D. usernames and their associated privileges can be listed
E. passwords can be directly extracted from SYSUAF.DAT

Answer: C, D

Question 10.
What is the purpose of "high water marking"?

A. prevent an application from writing file data beyond the disk quota limit
B. limit the use of XFC (eXtended File Cache) buffers
C. prevent reading file data beyond the point in a file which has been written
D. prevent a process from exhausting its FILLM quota

Answer: C

Question 11.
Which two mechanisms allow authentication of network access to a system without explicit login? Select two.

A. proxy account
B. Advanced Server
C. LDAP
D. active directory
E. SSH

Answer: A, E


Google
 
Web www.certsbraindumps.com


Study Guides and Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA





              Privacy Policy                   Disclaimer                    Feedback                    Term & Conditions

www.helpline4IT.com

ITCertKeys.com

Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.