You are on page 1of 10

Certified Support Provider (CSP Test) 2014R2

Duration : 6 hours
Passing Score : 80 point

1. $ApplicationChanged :
a. Is incremented each time the Notify Client
b. Changes each time a tagname or QuickScript
2. A hexadecimal value of 0x0040 for the quality defines a state of:
a. Good d. Cannot convert
b. Cannot access point e. Clamped high
c. Clamped low
3. A Tag ID is used to:
a. Act as a Pointer to other tags
b. Show the name of the tag assigned to a historical trend pen
c. Contain a set of related tags
d. Reference historical trend graphs
4. A, B, and C are memory discrete tags with the initial value of 0. What will be the value of A
after running the following script: A=B==C;
a. A=0 {because B and C are 0 }
b. A=1 {because the comparison between B and C are 1}
c. A=0 { because the value of B is passed to C}
d. The script will not validate in WindowMaker
e. Undefined. A will display an empty string
5. All the SQL Functions return a ResultCode that can be used for troubleshooting. What is
the Error Message associated with a ResultCode of -1002?
a. No bind list found. c. Connection failed.
b. Invalid Connection. d. Out of memory.
6. An InTouch Modern Application can be deleted from:
a. The SQL Server Management Studio
b. The ArchestrA IDE
c. Select Delete from the File menu in the InTouch Application Manager
d. None of the above
7. Assume that you have a Condition Script that executes every hour. In the body of the script you have:
InfoDisk(“C”,1,Trigger); How often will InfoDisk() execute?
a. InfoDisk() will execute each time the variable is true
b. InfoDisk() will execute every hour and variable is true
c. InfoDisk() will execute every hour only
8. Assume the following setup for an integer tagname: Minimum Value = -500 Maximum Value = 500 Minor
Deviation % = 10 Target = 250 At what value will a Minor Deviation alarm take place?
a. Whenever the tags value drops under 150
b. Whenever the tags value drops under 200
c. Whenever the tags value drops under 225
d. Whenever the tags value drops under -750
9. Conversion of an InTouch Application to an InTouchView Application is done:
a. using the menu Special/Application Type
b. using the IT2ITView Utility
c. automatically when starting WindowMaker
d. as an option during the installation of ArchestrA IDE
10. FileDelete() :
a. Does not accept wildcard characters.
b. The only wildcard character accepted by FileDelete is ( _ )
c. The only wildcard character accepted by FileDelete is ( * )
d. The wildcard characters accepted by FileDelete are ( #, &, - )
11. How do you convert window to Archestra Graphic?
a. File/Convert
b. Use the ControlsAdd Utility to add them
c. File/Import/Windows and script
d. In the Archestra Symbol Editor add Window
12. How do you instruct a customer to send you his Managed InTouch application? You will
need to open the app in the IDE to troubleshoot an issue with an Archestra Symbol.
a. Right-click on the instance of the InTouchViewApp
b. Right-click on the derived template of the InTouchViewApp
c. Export the table deployed_intouch_viewapp
13. I have a tag with the following alarm sub-state configuration:
Alarm Sub-State Value Alarm Inhibitor
LoLo 4 Inhibitor_LoLo
Lo 10 Inhibitor_Lo
Hi 60 Inhibitor_Hi
HiHi 80 Inhibitor_HiHi
When the value is 50 :
a. LoLo d. HiHi
b. Lo e. Hi
c. The tag will disappear from the alarm display
14. If InSQL is used as the History Provider in the Distributed Name Manager/Distributed History, under the
InSQL History Provider Properties window you have to enter in the Data Source box:
a. The name of the database to which you want to connect
b. The name of the node where the Industrial SQL Server database resides
15. If Tag Viewer is not enabled can you launch Tag Viewer?
a. Yes, so long as the minimum access level
b. Yes, so long as you do not get any warning message
c. No, unless you have the correct access level
d. No, a warning message will be logged.
16. If the Alarm Provider is in a different domain than the Alarm Consumer, will the Alarm Consumer be able to
see the alarms?
a. Yes, if the user has Administrative right
b. Yes, if the query has the fully qualified
c. No, all machines must be on the same domain
17. If the value of an IO tag changes in the middle of a condition script, is the new value immediately sent to the
I/O Server?
a. No, the value is sent after the script finished
b. Yes, the value is sent as soon as it change
18. If user installs InTouch Development on a node that does not have any SQL components it would
a. Install Full SQL Server automatically
b. Install SQL Express automatically
c. Install Oracle automatically
d. None of the above
19. If you set up a Hot Backup pair called MyPair, and you want to set your Distributed Alarm Objects default
query to look at the pair, what syntax would you use for the Alarm Query field of the Alarm Object
a. InTouch!MyPair c. MyPair!$System
b. MyPair d. PrimaryNodeNameMyPair
20. In Window Maker you create a Condition Script with the Condition: 15 ( the Condition Field holds just the
number 15). The script calls the LogMessage() function with different messages for On True, While True, On
False, and While False
a. None. The script will not validate in WindowMaker
b. While False and On False.
c. While True and On True.
d. On True only. f. On False only.
e. While True only. g. While False only.
21. In WindowMaker bitmaps can be defined with transparent colors. How many transparent colors can be
defined per bitmap?
a. 1 c. 3
b. 2 d. No limit.
22. In WindowMaker you must use solid colors for:
a. Line and text color links.
b. Text and fill color links.
c. Line, text and fill color links.
23. Inhibitor tagnames can be assigned to an alarm state in:
a. Window Maker only.
b. Window Viewer only.
c. Both Window Maker and Window Viewer.
24. IOGetNode() function returns:
a. The NetDDE node name on which the InTouch
b. The Masters node name in a NAD configuration
c. The node name for a given AccessName.
25. IOReinitialize() function:
a. Closes all existing I/O conversations and restarts all active I/O connections
b. Starts uninitiated IO conversation during Runtime
c. Reinitializes IO conversation only for troubleshooting
26. Once a user has logged on, he will always stay until another user logon OR until the application shuts down.
a. Yes, thats always true c. Yes, unless inactivity timeout is configured
b. No, that is always false d. No, unless windows (os) security is configured
27. One of the following tags is an invalid tag name.
a. E!1243 e. M125E4
b. Valve? f. VVALVE45
c. H45?20 g. T58!?X
d. 125E6
28. Open a managed application with WindowMaker. What is the name of the tab in
Special/Configure/WindowViewer that controls how the application accepts or declines changes at the
run-time node?
a. NAD c. Managed Application
b. Application Change Mode d. Distributed Application
29. Opening which of the following will open WindowMaker in the IDE?
a. InTouchViewApp Derived template c. InTouchViewApp Instance
b. ViewEngine Derived template d. ViewEngine Instance
30. Remote Tagname References uses the following protocol to retrieve data:
a. SQL c. Only DDE and SuiteLink.
b. Only Block DDE d. DDE/NetDDE/SuiteLink/Message Excluded
31. RETENTIV.T file is:
a. A binary file containing retentive information for Analog tags
b. A binary file containing retentive information for Discrete tags
c. A binary file containing retentive information for Indirect tags
d. A binary file containing retentive information for Historical Trends
32. Select the Remove Trailing Spaces option under the Alarm Printer utilities configuration settings window to :
a. Remove the extra trailing spaces from a printed field
b. Remove the extra trailing spaces from alarm printer
33. Select which are true regarding flipping InTouch objects and cells in WindowMaker. (check all that apply)
a. Text cannot be flipped
b. When an object is flipped, only its position
c. When a cell is flipped, both its image and position
d. All of above
34. SuperTag templates can be defined with up to how many members?
a. 32 c. 131
b. 64 d. No limit.
35. The alarm client (Distributed Alarm Object or AlarmViewer ActiveX) querying a Hot Backup pair, will show the
__________ as the Provider in the respective column.
a. Provider node name. c. Pair Name
b. Node name / Pair Name. d. None of the above.
36. The Alarm DB Logger Utility supports:
a. Only the SQL Authentication mode security
b. Only the Windows Security Model as the authentication
c. both a and b
37. The Alarm Printer utility configuration files have the extension:
a. .alc c. .alg
b. .prn d. None of them
38. The default value for ForceLogging is:
a. 5 minutes c. 15 minutes
b. 1 hour d. InTouch 9.0 doesnt have this option anymore
39. The protocol between a Terminal Server client and a Terminal Server is:
a. Suitelink c. Message Exchange
b. NetDDE d. Remote Desktop Protocol (RDP)
40. The result of 1 ^ 0 operation (Exclusive OR) is:
a. 1
b. 0
41. The script: DIM j AS INTEGER; j = j + 1; is placed in a push-button action script, after pressing the button 2
times, which of the choices below best describes the scripts behavior:
a. Integer tag j will be add by-1 after push-button active
b. First a local variable j is created as memory integer, j add by-1 after push-button active
42. The value in the Width column for the Column detail configuration of the AlarmViewer Control is the number
of_____.
a. Characters c. Twips
b. Pixels d. None of the above.
43. To copy or share a Modern InTouch Application , you must:
a. Move the application folder from one node to another
b. You cannot copy or share a Modern InTouch Application
c. Export the application as an .aaPKG file
44. To enable historical logging of remote referenced tags requires adding which line to the InTouch.ini file?
a. RemoteTagsNoIOEvents=1
b. RemoteTagsLogEvents=1
c. HistLogRemoteTags=1
d. EnableHistLogRemoteTags=1
45. Using the Cross Reference utility you can save your cross reference files as:
a. .txt d. .csv
b. .alt e. .crf
c. Both .txt and .csv
46. What do you need to do to configure a Hot Backup pair that has Alarm Providers running non-identical
applications?
a. Create an AccessName on each Provider
b. Set the Key Fields and then Map Alarms file
c. Nothing needs to be done, it just works
d. Cannot be done.
47. What happens when you select the Enable High Priority Window Cache check box?
a. This means that the % of the total physical Memory
b. This allows some windows to be marked as high priority
c. This allows the maximum duration for which the closed in-memory windows
d. This allows if you want to save all close windows
48. What is the .TimeTime dotfield used for?
a. Time in milliseconds since you last check
b. Time in milliseconds since the value of tag changed
c. Time in milliseconds since midnight that have elapsed
49. What is the default setting for Memory Limit for in-Memory Graphics?
a. 90% c. 5 hours
b. 70% d. 0 hours
50. What is the default setting for the High Priority Window Cache?
a. 50% c. 90%
b. 70% d. 95%
51. What is the default WWHeap maximum memory value for InTouch on a 32 bit version of Windows?
a. 256 MB c. 512 MB
b. 1.5 GB d. 2.0 GB
52. What is the External application that allows the user to watch and monitor tags and modify tag values at run
time in InTouch?
a. Object Viewer c. System Management Console
b. Tag Viewer d. Debugging
53. What is the maximum number of characters in an InTouch Message tag?
a. 80 c. 1024
b. 131 d. 65536
54. What is the name of the InTouch Supplementary Component that is used to create manufacturing recipes?
a. Recipe Manager c. InBatch
b. Formula Management Module d. Flex Formula
55. What is the purpose of the Wonderware InTouch file, tagname.avl?
a. Contains a Height-Balanced Binary Search
b. To record historically logged values for database
c. Binary file containing the tagname-to-path-name relationship
d. Binary file created for InTouch versions up to Ver.10.0
56. What is the Tagname Dictionarys maximum limit of SuperTag instances, which can be created?
a. 64 c. 4095
b. 16K d. Based on the InTouch tag license limit.
57. What kind of license file is used for InTouch?
a. ArchestrAServer.lic c. ArchestrA.lic
b. Wwsuite.lic d. None of the above
58. What script function returns the node name that a particular access name is pointing to?
a. InfoGetNode() c. IOSetAccessName()
b. IOGetNode() d. IOGetAccessName()
59. When an Archestra Symbol is exported from the IDE, which file type is it exported to?
a. aaPKG c. xml
b. cab d. vedef
60. When developing an application that supports multiple language interfaces, the exported application
dictionary file must follow the following format:
a. localeID_application name
b. application name_localeID
c. User defined name_localeID
61. When Historical Logging is enabled, data for each tag checked for ’Log Data’ is automatically written to disk
after X samples for that tag have been collected, where X is:
a. 5 d. 10
b. 22 e. 60
c. 120
62. When using SQL Access, select the correct Where expression to query on a column ( character data type)
called MyMsgColumn where the value equals a tag called MyMsgTag-- which is a memory message tag.
a. WhereExpr = MyMsgColumn= MyMsgTag;
b. WhereExpr = MyMsgColumn= + Text(MyMsgTag);
c. WhereExpr = MyMsgColumn = + MyMsgTag + ;
d. WhereExpr = MyMsgColumn= MyMsgTag ;
63. When using the Pan and Zoom feature, the maximum Zoom In in % is:
a. 300% c. 500%
b. 400% d. 750%
64. When using the Tag Browser Filters, the filter Asyn* would search for:
a. All tagnames beginning with the character *
b. All five character tagnames that begin with the character A
c. * can not be used as a wildcard.
65. Which InTouch feature allows running an InTouch application on another computer with a different display
resolution without recompiling the application?
a. MMAD (Multi Monitor Application Development)
b. DRC (Dynamic Resolution Conversion).
c. MMI (Monitor to Monitor Interface).
d. NAD (Network Application Development).
66. Which of the following is a correct syntax for the FileDelete() function:
a. status=FileDelete(“C:MyDirMyFile.txt”);
b. Status=FileDelete(C:MyDir*.txt);
c. both of the above
67. Which of the following most accurately completes the following sentence: A local variable must be defined
a. ... in the local variable definition.
b. ... before it is used.
c. ... at the top of the script.
d. ...at the beginning of QuickFunctions on the script
68. Which of the following parameters will force the current value of the tagname (checked for Log Data) to be
logged even if the change is less than or equal to the Log Deadband?
a. ForceLogCurrentValue=1;
b. LogCurrentValue=1;
c. ForceCurrentValue=1;
69. Which of the following statements is correct with regards to the AlarmViewer Control method called GetItem?
a. It does not exist
b. It is used to return the current query as specified by name passed
c. It is used to get the value of the Item
d. It is used to return the data at a specified row & colomn as string
70. Which of the following tag types are not supported as alarm inhibitor tags?
a. Integer tags
b. Indirect tags
c. Discrete tags
71. Which of the following would you use to disable only the Lo alarm state of a tag :
a. Tag.LoAlarmDisabled=1 c. Tag.AlarmLoDisabled=1
b. Tag.Lo.AlarmDisabled=1 d. Tag.AlarmDisable=1
72. Which statements are true for QuickFunction names? (check all that apply)
a. Blank spaces as long as [ ] are used around the scrip
b. Blank spaces as long as { } are used around the script
c. Blank spaces can not be used.
73. wwalmpurge.log is:
a. a log file where alarms are archived
b. a status file when alarms are purged/archived
c. That file does not exist
74. You are asked to design a display in runtime that should dynamically change the number of decimal places
based on the magnitude of a floating point value, for example you shoud display 2 decimal place
a. Use a visibility animation links for two
b. Create a string animation link to call the animation
c. Configure an Analog Display animation link
d. All of the above
75. You receive a customers Stand-Alone InTouch application and copy it to your hard drive. How does InTouch
find that application?
a. Double-click the tagname.x file
b. Select Tools/Find Applications in the InTouch Application Manager
c. Drag the folder containing the InTouch Application Manager
d. Select File/Find Application in WindowMaker
76. ActiveX methods, properties or events will execute correctly in an Application On Startup QuickScript.
O True O False
77. A button object can be configured to have all three of these scripts: On Left Click/Key Down, On Left/Key Up,
and On Left Double Click.
O True O False
78. ActiveX control animation and scripting is run on a separate thread from all other animation and scripting.
O True O False
79. Alarm DB Logger stores localized strings in the alarm database when using language switching for alarms.
O True O False
80. Alarm DB Logger Utility running on one computer node can log alarms for several other nodes.
O True O False
81. All entries made in the Real Time Trend Configuration dialog box are independent of the size of the trend and
are not modifiable at runtime.
O True O False
82. An ArchestrA Graphic Symbol can be created from a derived template or an instance within the IDE.
O True O False
83. An indirect tag that is assigned to a remote reference cannot access any tagname dot fields other than those
relating to value, time and quality.
O True O False
84. ArchestrA Graphic Symbols can be created from the ArchestrA Graphic Toolbox.in the IDE and from InTouch
WindowMaker.
O True O False
85. Can you modify the properties of a tag in Tag Viewer if the dotfield is Read Only?
O True O False
86. Does Modern InTouch Application support NAD (Network Application Development)?
O True O False
87. Each managed application is associated with an Archestra InTouchViewApp object, which is derived from a
base template.
O True O False
88. Each managed application is associated with an Archestra InTouchViewApp object, which is derived from a
base template.
O True O False
89. FileCopy() does not work when used with an asynchronous QuickFunction.
O True O False
90. From the Tag Browser you can browse InTouch Tags from another InTouch application on the same or
different PC.
O True O False
91. HistData cannot retrieve historical information from an InSQL Provider.
O True O False
92. If alarms for $System group are disabled, all derived (child) groups are also disabled.
O True O False
93. In a Modern InTouch Application, you do not see the tool bar icon for ArchestrA Graphics, and in the Project
View you can see ArchestrA Graphic Toolbox.
O True O False
94. In a String Input Link, password encryption can be enabled by selecting password under the Echo Charactor
option and then checking the Encrypt check box.
O True O False
95. Inputting a value into the .Comment dotfield while in WindowViewer, will write the value to the runtime
database but the value will not be saved in the Tagname Dictionary.
O True O False
96. Integer-type tags can only represent numbers from 0 to 65535 (unsigned) or -32767 to 32768 (signed).
O True O False
97. InTouch can log alarms to an Access Database using the Alarm DB Logger Utility.
O True O False
98. InTouch System tags are identified by a prefix of Sys as the first three characters of the tags name.
O True O False
99. IOSetRemoteReference() checks the validity of the new tag or access name before changing the object
references.
O True O False
100. Only the InTouch-Based security mode is compatible with Network Application Development
O True O False

You might also like