|
Question 1. What is the primary disadvantage in using VERIFIED WRITES on an Enscribe file? A. An additional read is required for each write. B. Additional CACHE is required for temporary storage. C. TMF is disabled during the WRITE command. D. READ access is slowed during block reads. Answer: A Question 2. What is the risk of updating an audited file in a TMF environment when no TMF transaction is active? A. The file may be marked as corrupt by the tile system. B. None. There is no risk in this activity. C. The record may cause a cache flush. D. None. It is not possible to do this task. Answer: D Question 3. What is a runaway transaction under TMF? A. any transaction that causes an excessive number of TMF transactions to abort within a relatively short period of time B. any TMF transaction which causes a bulk rollback of file updates across NonStop server nodes C. any transaction that, because of an application error, makes changes to a very large number of records in a database D. any TMF transaction which refuses to accept RESUMETRANSACTION requests from local processes Answer: C Question 4. Which technique is used to implement process pairs? A. checkpoint B. heartbeat C. keepalive message D. call to OSS API Answer: A Question 5. Which SQL/MP cursor statement can only be used with dynamic SQL? A. OPEN B. DECLARE CURSOR C. PREPARE D. FETCH Answer: C Question 6. When logging into osh from Guardian, all Guardian environment _______ are converted into OSS environment variables for the child process. A. defines B. assigns C. params D. startup messages Answer: C Question 7. To avoid a full table scan in OLTP queries, enable A. VSBB B. ESP C. MDAM D. SBB Answer: C Question 8. The Pathway/iTS product supports ________ requesters and web clients. A. TACL B. COBOL85 C. SCREEN COBOL D. Java Answer: C Question 9. Which fields are automatically supplied by EMS in an event message? Select THREE. A. the value of the subsystem ID B. the maximum version of fields in structures C. the length of the final event message D. the time at which the event was generated E. the name of the relevant manager process F. the value of the action ID token Answer: B, C, D Question 10. The purpose of the CTOEDIT utility is to _______ A. convert unstructured files to structured files B. convert C application code written on the PC to a Guardian edit file C. convert OSS text files to Guardian text files D. generate OSS code to be used in Guardian Answer: C
|
Question 1. A customer wants to ensure that any data sent to the Tivoli process automation engine's Integration Framework for retrieval of financial data into the Tivoli process automation engine cansurvive restarts and failures. Which statement is true? A. A JMS messaging engine must be configured with a persistent data store. B. The customer must havethe persist data option set for the Integration Framework adapter. C. It can be configured by setting a property inside theTivoli process automation engine after installation. D. The messages are stored local to the adapter and will survive failures without any additional configuration. Answer: A Question 2. What is the correct method to initiate an invocation channel? A. An action class B. Java system protocols C. An invocation message D. A Java Message Service (JMS) queue connection Answer: A Question 3. Where are the conditions for the Conditional user interface functionality defined? A. In the System Properties application B. In the Application Designer application C. In the Database Configuration application D. In the Conditional user interface application Answer: B Question 4. Which tasks can the user perform from the Scheduling Status tab on Run Reports on the Report Administration application? A. Preview a report; generate a report B. Edit a report schedule; preview a report C. View a report schedule; generate a report D. View a report schedule; edit a report schedule Answer: D Question 5. At which level are Drilldown options set? A. Site B. System C. Item Set D. Organization Answer: D Question 6. The building block of the Integration Framework enables applications to perform the following functions: publish and query application data; add, update, and delete application data; and import and export application data. What is this building block? A. Web services B. Object structure C. Extended Java objects D. Java message queuing Answer: B Question 7. When the agent saves the service request ticket, the system launches into a Service Request Workflow process and evaluates the data on the record. If the agent has not entered asset, location, or configuration item data, the system displays a dialog box with the following options: Close ticket - informational call Close ticket - unauthorized caller Close ticket - misdirected call Take no action If an asset, location, or configuration item is specified on the record, the system displays a dialog box with the following options: Take Ownership of ticket Assign Ownership of ticket Create Work Order Take no action on this ticket Which three Nodes are used in this part of the workflow process? (Choose three.) A. Wait B. Input C. Task D. Condition E. Interaction F. Manual Input Answer: D, E, F Question 8. Which two types of Migration packages can be defined? A. Push, Pull B. Ad hoc,Defined C. Snapshot, Change D. Dedicated, Run Time Answer: C Question 9. A client has two plants that share a raw material preprocessing facility. Which tructures would best fit this situation? A. Two organizations; two sites, each with a preprocessor and a plant; multiple systems B. Single organization; two sites, each having a preprocessor and a plant; one geographical system C. Single organization; single site; one primary geographical system; two functional processing systems D. Two organizations, each with a single site and duplicate preprocessor locations; two functional systems Answer: C Question 10. Which two types of condition can be created using the Conditional Expression Manager? (Choose two.) A. Class B. Unique C. Universal D. Expression E. Conditional Answer: A, D
Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.